1 | -- | 2 | Luca Compagna, Volkmar Lotz, Fabio Massacci. Preface |
3 | -- | 14 | Todd R. Andel, Alec Yasinsac. Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols |
15 | -- | 29 | Atle Refsdal, Ketil Stølen. Extending UML Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis |
31 | -- | 43 | Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic. Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks |
45 | -- | 56 | Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews. Managing Conflicts of Interest in Virtual Organisations |
57 | -- | 71 | Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, F. S. Proto, Simone Teofili. The SPARTA Pseudonym and Authorization System |
73 | -- | 89 | Adam Wierzbicki. The Case for Fairness of Trust Management |
91 | -- | 103 | J. F. Zandbelt, R. J. Hulsebosch, Mortaza S. Bargh, R. Arends. Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC |
105 | -- | 119 | Gabriele Lenzini, Mortaza S. Bargh, Bob Hulsebosch. Trust-enhanced Security in Location-based Adaptive Authentication |
121 | -- | 129 | Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna. Analyzing Security Scenarios Using Defence Trees and Answer Set Programming |
131 | -- | 140 | Jared Cordasco, Susanne Wetzel. Cryptographic Versus Trust-based Methods for MANET Routing Security |
141 | -- | 148 | Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V. Lokam, P. L. Montgomery, R. Venkatesan, Yacov Yacobi. Vulnerabilities in Anonymous Credential Systems |
149 | -- | 157 | Alessandro Basso, Michele Miraglia. Avoiding Massive Automated Voting in Internet Polls |
159 | -- | 167 | Ton van Deursen, Paul Koster, Milan Petkovic. Hedaquin: A Reputation-based Health Data Quality Indicator |
169 | -- | 177 | Joachim Biskup, Julia Hielscher, Sandra Wortmann. A Trust- and Property-based Access Control Model |